SMU Community Chat

Crowe Expert: Don’t Be Complacent About Cybersecurity
Written by Tim Triplett
November 9, 2021
Ransomware is a growth industry, netting some $20 billion from victims in 2021. A ransomware attack can happen at any time, to any business large or small, with devastating consequences. “It’s not just the big Colonial Pipeline incidents you read in the news. It’s happening to smaller organizations as well. A lot of times it’s their controls that are the weakest,” said Crowe cybersecurity expert Michael Del Giudice during last Wednesday’s Steel Market Update Community Chat.
How do cybersecurity breaches occur? Hackers with criminal intent usually begin with reconnaissance as they gather online information about a potential target. Then they look for a point of entry, often taking advantage of an unsuspecting employee who may have a weak password or can be tricked into clicking on an infected email attachment. That’s the pivot point at which they gain entry and can search for other system vulnerabilities and install malware. They may look for ways to extract data that they could then sell or, in the case of ransomware, block the company’s access to its critical systems until they make a ransom payment.
Cybersecurity is about maintaining the confidentiality of sensitive information, assuring the integrity and accuracy of data, and making sure those assets are available when they are needed. “Ransomware targets that availability aspect. It prevents you from doing business,” Del Giudice said.
“Should you pay the ransom? I get that question a lot,” he added. “The FBI says no, but that’s an easy answer. I agree, if you don’t have to, don’t pay it. But there are a lot of variables. If you don’t have the backup to recover your data and your systems, it is sometimes hard to not pay. There are a lot of people paying.”
What can an organization do to protect itself? Quick action is critical, Del Giudice said. Employees need to be trained in security awareness and how to respond to suspicious activity. Workers who think they may have clicked on a nefarious email, for example, should not request IT support and wait two days for the tech to show up. They should unplug their workstation from the network immediately so a virus cannot propagate.
From an administrative standpoint, procedures should be put in place to back up data periodically and store it offline. Networks should be segmented to head off the spread of malware. Systems should be set up to monitor and log any suspicious activity. Outbound channels of communication should be monitored to prevent data exfiltration. Response to incidents should be rapid, by individuals with the right technical skills. Contracting with a third-party cybersecurity firm, and getting insurance coverage for related breaches, are also recommended measures.
“It’s the basic blocking and tackling, making sure you are using strong passwords, patching the system, updating technology. There is this basic attitude that if it isn’t broken, we don’t need to fix it. But missing patches and outdated technology put you at risk,” he warned.
Editor’s note: Don’t miss SMU’s next free Community Chat, which will feature trade attorney Lewis Leibowitz at 11 a.m. Wednesday, Nov. 17. Click here to register.

Tim Triplett
Read more from Tim TriplettLatest in SMU Community Chat

SMU Community Chat: CRU’s Josh Spoores looks out over the Trump 2.0 battlefield
SMU Community Chat with CRU's Josh Spoores.

Join AWMI and SMU for a Community Chat webinar on steel AND aluminum
It’s been an eventful (and chaotic) start to the year for steel and aluminum as industry tries to navigate new Trump administration.

Community Chat on Feb. 19: CRU’s Josh Spoores to talk tariffs, prices, and the outlook for ’25
Josh Spoores, principal analyst at CRU, will be the featured speaker on the next SMU Community Chat webinar on Wednesday, Feb. 19, at 11 a.m. ET. The live webinar is free. A recording will be available for free to SMU members. You can register here.

Join us for Wednesday’s Community Chat with SMA President Philip K. Bell
We’ll talk about what to expect from the incoming Trump administration, the changing trade and tariff landscape, and what it all means for the domestic steel industry.

SMU Community Chat: Jan. 15 with SMA President Philip K. Bell
Steel Manufacturers Association (SMA) President Philip K. Bell will join SMU for our first Community Chat of 2025. We’ll talk about what to expect from the incoming Trump administration, the changing trade and tariff landscape – and what it all means for domestic steelmakers, service centers, and manufacturers. Don’t miss out! Mark your calendar for Jan. 15 at 11 am ET.